NEWS

Weak passwords cause ransomware woes

As one of the leading types of cyber-attacks, ransomware is expected to dominate cybercrime in 2020. According to PreciseSecurity.com research, weak passwords were one of the most common cybersecurity vulnerabilities in 2019, causing 30% of ransomware infections in 2019.

Read More

NEWS

CyberArk expands just-in-time capabilities

CyberArk has unveiled new just-in-time access capabilities that help reduce risk and improve operational efficiency as organizations implement broader least privilege strategies. By extending just-in-time support with the ability to remove unnecessary standing access to Linux systems, CyberArk remains the only privileged access management vendor to provide comprehensive just-in-time offerings across cloud and hybrid environments and on the endpoint.

Read More

NEWS

Organisations fail to protect keys and certificates

Only 54% of security professionals admit to having a written policy on length and randomness for keys for machine identities.

Read More



NEWS

PAM for DevOps

BeyondTrust’s centralised secrets administration solution strengthens credential protection in DevOps environments.

Read More

FireHost, the secure cloud provider, has appointed retired US Army Col. Jeff Schilling as chief...
A new programme to support cyber security startups will help develop innovative technical...
AirWatch by VMware and Mobile Iron lead adoption for security capabilities in the Enterprise...
Overwork and burnout are very real issues for the IT security industry in 2020, according to the...
SailPoint Technologies Holdings and Okta have formed a strategic partnership to provide...
USM 5.0 narrows the gap between security awareness and action with new asset management and threat...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more